A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2025-06-18T10:59:05Z",
"url": "https://infosec.exchange/@sudorandom/114704013454618750",
"attributedTo": "https://infosec.exchange/users/sudorandom",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/sudorandom/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2025-06-18:objectId=282506079:objectType=Conversation",
"content": "<p>Long before the internet, some phone networks were hackable by playing a single tone at 2600Hz.</p><p>Whistled into a phone, it could grant you unrestricted access. Do you have the vocal chops to be an old-school phone phreak?</p><p>I built a web app to test your ability to produce the legendary frequency. You won't get free long distance calls but you will get some honor in the knowledge that you could have been a cool hacker. 😎</p><p>I am sad to say that I can only whistle up to 1100Hz... But my wife (a long time woodwind player) is able to consistently get it.</p><p>Give it a try: <a href=\"https://phreak.kmcd.dev/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">phreak.kmcd.dev/</span><span class=\"invisible\"></span></a></p><p><a href=\"https://infosec.exchange/tags/phreaking\" class=\"mention hashtag\" rel=\"tag\">#<span>phreaking</span></a> <a href=\"https://infosec.exchange/tags/2600Hz\" class=\"mention hashtag\" rel=\"tag\">#<span>2600Hz</span></a> <a href=\"https://infosec.exchange/tags/bluebox\" class=\"mention hashtag\" rel=\"tag\">#<span>bluebox</span></a> <a href=\"https://infosec.exchange/tags/RetroComputing\" class=\"mention hashtag\" rel=\"tag\">#<span>RetroComputing</span></a> <a href=\"https://infosec.exchange/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/Tech\" class=\"mention hashtag\" rel=\"tag\">#<span>Tech</span></a></p>",
"contentMap": {
"en": "<p>Long before the internet, some phone networks were hackable by playing a single tone at 2600Hz.</p><p>Whistled into a phone, it could grant you unrestricted access. Do you have the vocal chops to be an old-school phone phreak?</p><p>I built a web app to test your ability to produce the legendary frequency. You won't get free long distance calls but you will get some honor in the knowledge that you could have been a cool hacker. 😎</p><p>I am sad to say that I can only whistle up to 1100Hz... But my wife (a long time woodwind player) is able to consistently get it.</p><p>Give it a try: <a href=\"https://phreak.kmcd.dev/\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">phreak.kmcd.dev/</span><span class=\"invisible\"></span></a></p><p><a href=\"https://infosec.exchange/tags/phreaking\" class=\"mention hashtag\" rel=\"tag\">#<span>phreaking</span></a> <a href=\"https://infosec.exchange/tags/2600Hz\" class=\"mention hashtag\" rel=\"tag\">#<span>2600Hz</span></a> <a href=\"https://infosec.exchange/tags/bluebox\" class=\"mention hashtag\" rel=\"tag\">#<span>bluebox</span></a> <a href=\"https://infosec.exchange/tags/RetroComputing\" class=\"mention hashtag\" rel=\"tag\">#<span>RetroComputing</span></a> <a href=\"https://infosec.exchange/tags/hacker\" class=\"mention hashtag\" rel=\"tag\">#<span>hacker</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/Tech\" class=\"mention hashtag\" rel=\"tag\">#<span>Tech</span></a></p>"
},
"updated": "2025-06-18T17:06:08Z",
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/phreaking",
"name": "#phreaking"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/2600hz",
"name": "#2600hz"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/bluebox",
"name": "#bluebox"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/retrocomputing",
"name": "#retrocomputing"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/hacker",
"name": "#hacker"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/tech",
"name": "#tech"
}
],
"replies": {
"id": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750/replies?min_id=114704488442036897&page=true",
"partOf": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750/replies",
"items": [
"https://infosec.exchange/users/sudorandom/statuses/114704488442036897"
]
}
},
"likes": {
"id": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750/likes",
"type": "Collection",
"totalItems": 462
},
"shares": {
"id": "https://infosec.exchange/users/sudorandom/statuses/114704013454618750/shares",
"type": "Collection",
"totalItems": 408
}
}